Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure

—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various...

Full description

Saved in:
Bibliographic Details
Main Authors: Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad
Format: Proceeding
Language:English
Published: 2022
Subjects:
Online Access:http://ir.unimas.my/id/eprint/40380/1/Employing%20Public%20-%20Copy.pdf
http://ir.unimas.my/id/eprint/40380/
http://aiic.upm.edu.my/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.unimas.ir.40380
record_format eprints
spelling my.unimas.ir.403802023-10-06T02:00:10Z http://ir.unimas.my/id/eprint/40380/ Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure Nayeem Ahmad, Khan Adnan Shahid, Khan Seleviawati, Tarmizi Azlina, Ahmadi Julaihi Zeeshan, Ahmad QA76 Computer software —The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. The significant challenge faced is the attack on these protocols. Among the reported attacks on TSL is the Drown attack which is a prevalent type of attack. In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. The proposed method removes the need for credentials, including client-server certificates and client-server key exchange. 2022-05-18 Proceeding PeerReviewed text en http://ir.unimas.my/id/eprint/40380/1/Employing%20Public%20-%20Copy.pdf Nayeem Ahmad, Khan and Adnan Shahid, Khan and Seleviawati, Tarmizi and Azlina, Ahmadi Julaihi and Zeeshan, Ahmad (2022) Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure. In: AiIC2022: Applied Informatics International Conference 2022, 18-19 MAY 2022, UPM MALAYSIA-VIRTUAL CONFERENCE. http://aiic.upm.edu.my/
institution Universiti Malaysia Sarawak
building Centre for Academic Information Services (CAIS)
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sarawak
content_source UNIMAS Institutional Repository
url_provider http://ir.unimas.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Nayeem Ahmad, Khan
Adnan Shahid, Khan
Seleviawati, Tarmizi
Azlina, Ahmadi Julaihi
Zeeshan, Ahmad
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
description —The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. When communicating between client and server, these algorithms address challenges like confidentiality, integrity, availability, and non-repudiation. The significant challenge faced is the attack on these protocols. Among the reported attacks on TSL is the Drown attack which is a prevalent type of attack. In order to prevent such types of attacks, a Public Key Infrastructure (PKI) method is proposed in this study for encapsulating messages between the client and the server while doing the TLS handshake process. The proposed method removes the need for credentials, including client-server certificates and client-server key exchange.
format Proceeding
author Nayeem Ahmad, Khan
Adnan Shahid, Khan
Seleviawati, Tarmizi
Azlina, Ahmadi Julaihi
Zeeshan, Ahmad
author_facet Nayeem Ahmad, Khan
Adnan Shahid, Khan
Seleviawati, Tarmizi
Azlina, Ahmadi Julaihi
Zeeshan, Ahmad
author_sort Nayeem Ahmad, Khan
title Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
title_short Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
title_full Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
title_fullStr Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
title_full_unstemmed Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
title_sort employing public key infrastructure to encapsulate messages during transport layer security handshake procedure
publishDate 2022
url http://ir.unimas.my/id/eprint/40380/1/Employing%20Public%20-%20Copy.pdf
http://ir.unimas.my/id/eprint/40380/
http://aiic.upm.edu.my/
_version_ 1779150707108085760
score 13.154949